FOR STUDENTS

Cybersecurity Student Fellows

52679009526_1f449a49d3_o

In keeping with our mission to promote the interdisciplinary study of cybersecurity issues (generously supported by the Hewlett Foundation), the Strauss Center established the Cybersecurity Student Fellows Program to encourage full-time, in-residence graduate students from all departments who have an interest in cybersecurity to take relevant courses from outside their home department, to reward students who pursue this approach with formal recognition, to generate a cross-campus community of interest featuring a speaker series and mentoring, and to provide financial support for cybersecurity-related research, conference attendance, and the like.

How It Works

There are two stages to the Cybersecurity Student Fellows Program:

Those who complete these requirements will then certified by the Strauss Center as successfully completing the courses needed for the Cybersecurity Student Fellowship.

1
Stage One

Each year, on a rolling basis, we select a group of graduate students from across the campus to form the Cyber Student Fellowship class. For the remainder of their time at UT, Fellows will receive advice and mentoring relating to cross-disciplinary education opportunities at UT; access to funding to support cybersecurity-related research and travel; support and coaching for those who wish to participate in the Austin and DC rounds of the Atlantic Council’s cybersecurity policy competition; and priority involvement in the series of cybersecurity-related speakers and events we sponsor.

2
Stage Two

The goal is for each Fellow to complete a certain number of cybersecurity-related courses during their time at UT (with a grade of 3.0 or above in each course). Please note that for courses that are offered for a grade, the student must take it for a grade (and get at least a 3.0) in order for it to count. For courses offered P/F only, however, the requirement is to Pass. We expect each Fellow to make a good-faith effort to achieve this, and we will work with Fellows as needed to help make it possible. Those who do complete these requirements will then be certified by the Strauss Center as having completed the "Integrated Cybersecurity Studies" course sequence. 

Program Details

Courses that Count

The current list of eligible courses* for the 2024-2025 academic year appears in full below. As you will see, the fundamental requirements are:

  • complete at least four courses from the eligible list
  • at least one of these must be on the “technical” track
  • at least one of these must be on the “non-technical” track

 

Requests to add additional courses to the eligible list are always welcome. The initial list of eligible courses includes two distinct groupings: the Technical Track and the Non-Technical Track. As noted above, students must take at least one course from each of these tracks.

TECHNICAL TRACK COURSES (MUST TAKE AT LEAST ONE FROM THIS TRACK)

For students who do not have a strong computer science or engineering background, by far the best option for satisfying the Technical Track requirement is to take our custom-designed technology introduction course, offered each fall:

 

  • Technology of Cybersecurity: An Introduction for Law and Policy Students (LAW 396V, Fall and Spring, Nielson; Also listed as “PA 380L Topics in Public Policy and Law: Cybersecurity Technology” at the LBJ School.

 

Students who do have sufficient technical background, in contrast, can take a technical graduate-level computer science or engineering course, which they must discuss first with Susan Crane (scrane@austin.utexas.edu) for approval.

NON-TECHNICAL TRACK COURSES (MUST TAKE AT LEAST ONE FROM THIS TRACK)

  • Cybersecurity Law and Policy (REQUIRED) (PA 380L, LAW 379M, BGS 380, CE 397, CS 395T, INF 390N, Fall, Springer)
  • Directed Research Study in Law (LAW 379M, Fall and Spring)
  • Independent Study in Public Policy (PA 189C, Fall and Spring) Please email Susan Crane (scrane@austin.utexas.edu) for research topic approval
  • Seminar: The International Law of Cyber Conflict (LAW 296V, Spring, Jensen)
  • Seminar: Propaganda, Deception, and Manipulation in the Technology Era (LAW 397S, Spring, Jones)
  • Privacy Law: Personal Data Under U.S. and E.U. Law (LAW 379M, Spring, Huffman)
  • Cyber Incident Response (LAW 189T, Spring, Liebermann)
  • Crypto, Law, and Policy (LAW 196V, Spring, Kian)

 

Students who do have sufficient technical background, in contrast, can take a technical graduate-level computer science or engineering course, which they must discuss first with Susan Crane (scrane@austin.utexas.edu) for approval.

*Requests to count a course not included on the above list must be submitted prior to taking the course and are reviewed on a student-by-student basis.

How to Apply

Applying to be a Cyber Student Fellow

WHEN IS THE DEADLINE?

The application period is always open. Applications will be accepted and reviewed on a rolling basis. Please email application materials to Susan Crane at scrane@austin.utexas.edu

Applications should include

  • A statement of interest describing your career goals, your current degree program (including confirmation that you are enrolled full-time, in residence at UT Austin’s School of Law), and the areas of cross-disciplinary exposure that interest you most (minimum 3.0 GPA);
  • A resume;
  • A transcript;
  • A statement of the courses you have in mind to take in fulfillment of the requirements above (including a description of whether your degree program will allow cross-registration in the event one of these courses is not listed with your home department).
Cybersecurity Events

Events

Office Hours: Texas Cybersecurity Clinic
  • March 11, 2026
  • 1:00 pm - 2:00 pm
  • Zoom

Information Session: Texas Cybersecurity Clinic

2025 Cyber 9/12 Strategy Challenge
  • January 31, 2026 - February 1, 2026
  • 9:00 - 5:00 pm
  • School of Law, UT Austin

2026 Cyber 9/12 Strategy Challenge

Office Hours: Texas Cybersecurity Clinic
  • October 2, 2025
  • 9:00 am - 4:00 pm
  • RSVP Only

Office Hours: Texas Cybersecurity Clinic